Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 06:28

General

  • Target

    e9a4427d9ea3c5bfe298f3efb285900ea058dea147a2535dedd70a294cdbd23a.exe

  • Size

    86KB

  • MD5

    6aa15a2c8f2d325f89ba04cf95c8da30

  • SHA1

    519e14b3cd5d476642a2cf778ed638d6749e71ee

  • SHA256

    e9a4427d9ea3c5bfe298f3efb285900ea058dea147a2535dedd70a294cdbd23a

  • SHA512

    cf41c318375826df36b7efd9e804690cbd430fc7b41feccefcb0738dfdcee80ff84543122140c377eaa44c8c340232e03f2428456a788d0bed623593a7aa6597

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdYSWO:6e7WpMaxeb0CYJ97lEYNR73e+eBSWO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3453) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9a4427d9ea3c5bfe298f3efb285900ea058dea147a2535dedd70a294cdbd23a.exe
    "C:\Users\Admin\AppData\Local\Temp\e9a4427d9ea3c5bfe298f3efb285900ea058dea147a2535dedd70a294cdbd23a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2456

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          86KB

          MD5

          cbf6c5805102ddfefeca42062980ad17

          SHA1

          2bd45dde7cda8f57d0bb57b4ace14f8b090d3393

          SHA256

          00cc214eeb69ff5e8225fa2473c7d5c722f05933cb8bd149c334f590b89b5e70

          SHA512

          9b661c8c4e4c221c6613cba31644c50148652ef6dccb56a29c1a63ee92ac829e651714d4021c6574463f3cacd47ba6e6545fc415c94aa092787cbdd2594424ee

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          95KB

          MD5

          10638a58355952c0fbeeb536b2ee85c2

          SHA1

          2f935875577e27f2f27420742e48331983e3b532

          SHA256

          d6023b45a81dcd24c125fd6225f3a4e86737e6e3a7b687ae4fcc9e9bea2fbbec

          SHA512

          4272f21bfc8727a6a439f12c0c8232160e46a557eb8dc7916251a3f42bc06490d1252df07388a6f43b8539497f3459f9d510a16a5a6a652097811437020355cf